Skip to main navigation Skip to search Skip to main content

The checkpoint interval optimization of kernel-level rollback recovery based on the embedded mobile computing system

  • School of Computer Science and Technology, Harbin Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Due to the limited resources of the embedded mobile computing systems, such as wearable computers, PDAs or sensor nodes, reducing the overhead of the software implemented fault tolerance mechanism is a key factor in reliability design. Two checkpoint interval optimization techniques of kernel-level rollback recover mechanism are discussed. Step-checkpointing algorithm modulates checkpoint intervals on-line according to the characteristics of software or hardware environment-dependent system that the failure rate fluctuates acutely shortly after the system fails. Checkpoint size monitoring and threshold-control technique adjusts the checkpoint interval by predicting the amount of data to be saved. Combining these two techniques can effectively improve the performance of the embedded mobile computer system.

Original languageEnglish
Title of host publicationProceedings - 8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008
Pages521-526
Number of pages6
DOIs
StatePublished - 2008
Externally publishedYes
Event8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008 - Sydney, Australia
Duration: 8 Jul 200811 Jul 2008

Publication series

NameProceedings - 8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008

Conference

Conference8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008
Country/TerritoryAustralia
CitySydney
Period8/07/0811/07/08

Fingerprint

Dive into the research topics of 'The checkpoint interval optimization of kernel-level rollback recovery based on the embedded mobile computing system'. Together they form a unique fingerprint.

Cite this